CVE-2005-3962

Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
References
Link Resource
http://www.dyadsecurity.com/perl-0002.html Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/948385 US Government Resource
http://www.securityfocus.com/bid/15629
http://secunia.com/advisories/17802 Vendor Advisory
http://secunia.com/advisories/17844 Vendor Advisory
http://secunia.com/advisories/17762 Vendor Advisory
http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html
http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml
http://www.trustix.org/errata/2005/0070
http://secunia.com/advisories/17941 Vendor Advisory
http://secunia.com/advisories/17952 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-880.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_71_perl.html
http://secunia.com/advisories/18183 Vendor Advisory
http://secunia.com/advisories/18187 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-881.html Vendor Advisory
http://secunia.com/advisories/18075 Vendor Advisory
http://www.openbsd.org/errata37.html#perl
http://secunia.com/advisories/18295 Vendor Advisory
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch
http://www.osvdb.org/21345
http://www.osvdb.org/22255
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
http://secunia.com/advisories/18517 Vendor Advisory
http://secunia.com/advisories/17993 Vendor Advisory
https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1
http://secunia.com/advisories/19041 Vendor Advisory
http://www.debian.org/security/2006/dsa-943
http://secunia.com/advisories/18413 Vendor Advisory
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
http://www.novell.com/linux/security/advisories/2005_29_sr.html
http://secunia.com/advisories/20894 Vendor Advisory
http://docs.info.apple.com/article.html?artnum=304829
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
http://www.us-cert.gov/cas/techalerts/TA06-333A.html US Government Resource
http://secunia.com/advisories/23155 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:225
http://www.ipcop.org/index.php?name=News&file=article&sid=41
http://secunia.com/advisories/31208 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2613 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0771
http://www.vupen.com/english/advisories/2006/4750
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch
http://www.vupen.com/english/advisories/2005/2688
http://marc.info/?l=full-disclosure&m=113342788118630&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598
https://usn.ubuntu.com/222-1/
http://www.securityfocus.com/archive/1/438726/100/0/threaded
http://www.securityfocus.com/archive/1/418333/100/0/threaded
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*

Information

Published : 2005-12-01 09:03

Updated : 2018-10-19 08:39


NVD link : CVE-2005-3962

Mitre link : CVE-2005-3962


JSON object : View

CWE
CWE-189

Numeric Errors

Advertisement

dedicated server usa

Products Affected

perl

  • perl